Documentation Index
Fetch the complete documentation index at: https://docs.stacyide.xyz/llms.txt
Use this file to discover all available pages before exploring further.
Public Support Matrix
This matrix sets expectations for public self-serve StacyVM installs. It separates generally supported workflows from host-gated runtime certification so operators know what can be used immediately, what must be validated on their own infrastructure, and what remains experimental.
Support Levels
| Level | Meaning |
|---|
| Supported | Covered by CI, documented setup, release verification, and support-bundle workflows. |
| Host-certified | Supported after scripts/certify-runtime.sh passes on the target host and the report is retained. |
| Preview | Usable for evaluation, but not recommended for production workloads without maintainer review. |
| Experimental | Available for development or constrained environments; not a production isolation boundary. |
| Planned | Production design exists, but implementation is not complete enough for self-serve users. |
Runtime And Deployment Matrix
| Mode | Support level | Public self-serve status | Required evidence | Limitations |
|---|
| Local mock provider | Supported | Development only | go test ./... or CI pass | No sandbox isolation; not a production runtime. |
| Single-node Docker/runc | Supported | Technical production with hardened config | stacyvm config lint --production, stacyvm doctor --production, support bundle | Isolation is container-based; operators must keep Docker, kernel, and seccomp policy patched. |
| Single-node Docker with gVisor | Host-certified | Recommended container hardening path | Runtime certification report for gvisor | Requires host runtime installation and Docker runtime wiring outside StacyVM. |
| Single-node Docker with Kata | Host-certified | VM-backed container path | Runtime certification report for kata | Requires host runtime installation, VM support, and capacity planning. |
| Firecracker | Host-certified | VM isolation path for Linux/KVM hosts | Runtime certification report for firecracker | Requires Linux, KVM, kernel/rootfs/agent assets, and host networking setup. |
| PRoot | Experimental | Development and restricted hosts only | Runtime certification report for proot if used | Not a VM or container isolation boundary; production use is not recommended. |
| E2B/custom provider | Preview | Integration-specific | Provider health, conformance results, and provider-specific logs | External provider availability, auth, and isolation guarantees are outside StacyVM’s direct control. |
| Multi-worker cluster | Preview | Enterprise self-serve with OIDC + tenant model | Cluster conformance output, Postgres contract output, worker identity certification report, runtime certification for every worker runtime, OIDC provider configuration, and tenant policy review | Worker registry, placement, leases, Postgres store path, signed worker identity, centralized token issuance, worker RPC routing, mTLS wiring, OIDC/JWT RS256 auth, RBAC roles (viewer/operator/admin/tenant_admin), tenant model, policy controls, and per-tenant audit export are implemented. Remaining: target-network mTLS smoke with deployment-issued certificates for specific enterprise networks. |
Public Install Requirements
Before treating a self-serve install as supported, operators should capture:
- Release verification output from
scripts/verify-release.sh <version> <arch> or installer output with Sigstore verification.
stacyvm config lint --production --file <config> output with production environment variables loaded.
- Confirmation that
server.cors_allowed_origins contains exact trusted origins, not *.
stacyvm upgrade rehearse --config <config> --database <db> output before binary or image replacement.
stacyvm doctor --production output from the target host.
stacyvm support bundle --output support.json when opening a support issue.
- Runtime certification output for gVisor, Kata, Firecracker, or PRoot hosts.
- Worker identity certification output from
scripts/certify-worker-identity.sh <worker-id> --format markdown --output worker-identity-certification.md for multi-worker previews.
- Evidence that externally issued worker token files refresh before expiry when workers rely on
stacyvm worker --worker-token-file instead of local signing keys.
- Public readiness evidence from
scripts/public-readiness-evidence.sh --output public-readiness-evidence.md.
GitHub bug and production support issue templates ask for this same evidence. Reports without the relevant artifacts may need an extra triage round before maintainers can reproduce or classify the issue.
Known Public Limitations
- SQLite is the supported single-node store. Postgres-backed cluster semantics exist, but multi-worker production still requires deployment-specific Postgres contract evidence and backup/restore rehearsal.
- API keys and admin keys are the primary auth path for single-node deployments. OIDC/JWT RS256 Bearer token auth with JWKS is implemented for enterprise multi-tenant deployments (
auth.oidc_enabled, auth.oidc_issuer, auth.oidc_jwks_url). OIDC group-to-role mapping covers viewer, operator, admin, and tenant_admin roles.
- Docker/runc is convenient and supported with hardened settings, but it is not equivalent to VM isolation.
- Firecracker production readiness is host-gated because KVM, kernel, rootfs, agent, and networking setup vary by host.
- PRoot is useful where Docker/KVM are unavailable, but it should not be presented as a production isolation boundary.
- Release signatures prove artifact provenance from the StacyVM GitHub Actions release workflow; they do not certify a host runtime.
- CORS is intentionally wildcard by default for local development, but public browser/API deployments must configure explicit trusted origins and pass production config lint.
Support Triage Links
| Symptom | First remediation path |
|---|
| Install verification fails | releasing |
| Production config lint fails | deployment |
| Upgrade rehearsal fails | deployment#upgrades |
| Runtime health fails | runtime-certification |
| Runtime behavior differs across providers | runtime-conformance |
| Admin or auth hardening question | security-governance |
| Operator diagnostics needed | deployment#support-bundles |
Post-Tag Release Verification
CI builds release binaries and validates checksums before code is merged into a release branch. After a real version tag is published, maintainers should run the public verifier against the GitHub release assets:
scripts/post-release-validate.sh <version>
On a clean Linux host, also run the installer in verify-only mode with signatures required:
STACYVM_VALIDATE_INSTALLER=true scripts/post-release-validate.sh <version>
For a final install smoke, run scripts/install.sh once with default checksum verification and once with STACYVM_REQUIRE_SIGNATURES=true plus cosign installed.